Hysolate extends cybersecurity isolation platform to protect sensitive information

Hysolate, pioneer of secure software-defined endpoints, announced major extensions to the Hysolate cybersecurity isolation platform. The new capabilities, which include granular USB control, hypervisor-based VPN, and support for Microsoft Azure Information Protection, make it easier than ever for enterprises to fully protect endpoints from cyberattacks while freeing end-users to access the resources they need.

“Enterprise end-users are easy and frequent targets for cyberattackers. To protect their devices, companies often layer on security tools and limit what employees can access. But even that doesn’t stop corporate assets from being infiltrated,” said Yuki Arbel, VP Product Management at Hysolate. “The Hysolate Platform solves this urgent problem by re-architecting endpoints, making them the secure and productive environments they were meant to be. With these new capabilities, we’re extending our no-compromise/no-risk solution by enabling end-users to work in the most productive ways, while safeguarding the crown jewels.”

Hysolate revolutionizes endpoint architecture. The Hysolate Platform automatically turns end-user devices into the world’s first software-defined endpoints, in which each endpoint has multiple isolated virtual environments. Endpoints are built on top of a slim hypervisor layer that sits below the operating system.

Everything an end-user does happens in specified local virtualized desktops—for example, one that’s limited to sensitive corporate data and another that allows emails and Internet browsing. The environments run locally, side-by-side on the same device, yet are fully isolated. Applications and services automatically launch in the correct, designated virtual environment, making the experience seamless for end-users.

New features for protecting sensitive information

Granular USB Control: Hysolate eliminates the need for productivity-busting security policies that restrict end-users from plugging USBs into their devices. Its granular USB control identifies USB types and lets IT admins define (1) if the device should be permitted and (2) which virtual environment each USB type can connect to. For instance, companies can specify that USB-enabled 2FA hardware tokens like the RSA SecurID 800 are permitted to connect to the sensitive desktop for privileged access or access to payment systems. Companies can also allow users to freely use USBs in the isolated internet-exposed environment without exposing corporate assets to risk.

Hypervisor-based VPN: Hysolate enables end-users to work remotely without security concerns. Instead of a VPN client running within the user’s operating system – which could be compromised by malware or be exposed to an attack by a rogue WiFi network – it is installed below the OS. Here, it securely runs in a separate, hardened, non-persistent environment on the Hysolate hypervisor platform to ensure sensitive environments are not at risk of compromise. With this approach, road warriors can use their machines safely in coffee shops and on airplanes without exposing the organization to increased risk.

Extended protection for sensitive information: Hysolate has added support for Azure Information Protection, which classifies data based on its sensitivity and defines how it can be accessed and shared. This integration enables the Hysolate Platform to automatically incorporate these classifications into policies that define what end-users can copy/paste between virtual environments, further protecting corporate assets.

More about

Don't miss